New Post

Rss

Monday, January 20, 2014
no image

How to Using Unclock a PUK code.


If you enter the wrong PIN three times, your SIM card will be locked. You'll need to phone us to get a PUK code to unlock your SIM. Call us on 333 free from a Three phone or 0843 373 3333 from any other phone (5p per minute from a BT landline, other networks may vary) to request a PUK code.

Important: Don't try to unlock your SIM without getting a PUK code from us. If you use the wrong one it will block your SIM completely. If it does get blocked, you'll lose all the information stored on your SIM and you'll need to get a new one.

To unlock your phone with a PUK code:

  1. Enter the PUK code provided and tap Next

Saturday, January 18, 2014
no image

How do I share my Internet connection over Wi-Fi from the command line?

This feature is called hosted networks. On a Wi-Fi enabled computer running Windows 7 or later, use the following commands in an elevated command prompt:
  • netsh wlan set hostednetwork mode=MODE ssid=SSID key=KEY keyusage=KEYUSAGE
    Changes access point settings. mode can be allow or disallow, specifying whether the access point is enabled. ssid is the name of the network; key is the encryption key used for accessing the network. keyusage can be persistent or temporary, indicating whether the key is kept or discarded after one use (the default is persistent). Note that WPA2-AES is used.
  • netsh wlan start hostednetwork
    Starts the access point.
  • netsh wlan stop hostednetwork
    Stops the access point.
  • netsh wlan show hostednetwork
    Shows the status of the access point.
Sunday, January 12, 2014
no image

Server Side Validation with PHP/MySQL

This sample code demonstrate you how to make server side validation with the use of PHP. This demo also contains INSERT, UPDATE ,DELETE. So if all the fields in registration form are valid then it will be inserted into the database, also you can edit that data and you can update it too.
Database Name: employee2
Note: Due to the size or complexity of this submission, the author has submitted it as a .zip file to shorten your download time. After downloading it, you will need a program like Winzip to decompress it.
Virus note: All files are scanned once-a-day by SourceCodester.com for viruses, but new viruses come out every day, so no prevention program can catch 100% of them.
FOR YOUR OWN SAFETY, PLEASE:
1. Re-scan downloaded files using your personal virus checker before using it.
2. NEVER, EVER run compiled files (.exe's, .ocx's, .dll's etc.)--only run source code.
  download it

Saturday, January 11, 2014
no image

12 Steps To Become A Hacker!


Here we bring to you 12 steps to become a hacker, together with all the books, tutorials and resources that you need to learn in the process. So pack your bags and get set for the journey! 

  Hacking is a fascinating field but it definitely isn't easy. Here we have listed 12 of the most important steps essential to become a hacker, together with all the resources that you need for learning.

Here we focus on the skills and attitude needed to become a hacker. Breaking the security system and entering into the system is not the only thing a hacker does. One requires knowledge of a wide variety of subjects and in depth knowledge of programming languages and operating systems. And needless to say, learning is essential in the journey...

hacking, learn hacking, Unix, Linux, cryptography, books on hacking, tutorials on hacking, how to become a hacker
Here are the 12 steps:

It is not an easy task to become a hacker. As a hacker, you need to have an attitude and curiosity. Reading the hacking manifesto can teach you the attitude of a hacker. Nurturing the hacker attitude is more about developing competence in the languages rather than having a stereotypical attitude.

Though a lot of people consider that a hacker is a criminal, in real life, they are hired by big companies for protecting information and minimizing potential damage. The act of hacking actually is that of being over-curious and outwitting authority. As a hacker, you should be hell bent on breaching authoritarian rules, secrecy and censorship. Deception is another arsenal which will allow you to dodge the vigilant eyes of authority.

The act of stealing something or doing harm to someone is not hacking. Such people are commonly called crackers in the community. Crackers are involved in illegal activities and we do not recommend you to get involved into such activities.

Step 1: Learn To Program In C

no image

How to Create a Computer Virus

This article is about how to create a virus. This is not a joke. But why will you create a virus, most likely for testing your anti-virus or for fun. Always remember that this is only a test file and doesn't harm your computer at any cost. This file was developed by EICAR (European Institute of Computer Antivirus Research). So here's a step by step procedure to check your

Steps


  1. 1
    Ad
  2. 2
    Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.
  3. 3
    Paste this code: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  4. 4
  5. 5
  6. 6
    Rename the file from New Text Document.txt to myfile.com
  7. 7
    Scan that file with you anti-virus. You'll find that that is a virus.
  8. 8
no image

How long should I charge my laptop computer battery for?

Below are some general guidelines that should be followed when charging your laptop computer battery. Keep in mind these are general suggestions and that if your computer or battery documentation states something different those directions should be followed.

New battery or first use

After purchasing a new laptop computer or battery for your laptop we recommend that the battery be charged for no less than 24-hours. This helps verify the battery is fully charged and will help with the batteries life expectancy. After being fully charged we also suggest letting the battery fully discharge and then fully charging it again. Doing this multiple times may extend the battery life even further.
If you're excited to use your new laptop, it can still be used while plugged in. However, we suggest not unplugging it until it's been charged for that length of time.

All other charges

After the computer battery has gone through it's initial charge all other battery charging should go until the laptop has reached its capacity. Often this will only be a few hours of charging.
Note: Even when the computer is off as long as it's plugged in it will continue to charge.
Copyright © Apps computing All Right Reserved
Designed by Harman Singh Hira @ Open w3.